Search25 Results
- Knowledge Base
- Information Security & Privacy
The University of Illinois uses a 2-Factor authentication (2FA) service provided by Duo Security, an industry leader in cyber security services. This will help secure your account and the University's sensitive data. The University of Illinois is committed to securing its institutional data and the personal information of everyone at the University.
- Knowledge Base
- Information Security & Privacy
Security keys are small, portable devices that you can use to log into Duo, the university's multi-factor authentication system. Most people are able to log into Duo using their personal cell phone with the Duo Mobile app. But if you cannot or do not want to use your personal device for 2FA, then a security key is recommended.
- Knowledge Base
- Information Security & Privacy
Step by Step guide on How to Manage your 2FA (2-factor authentication) Devices.
- Knowledge Base
- Information Security & Privacy
This article summarizes the different types of devices you can use to authenticate with our MFA (Multi-Factor Authentication) provider.
- Knowledge Base
- Information Security & Privacy
If you have lost, forgot, or can not access your 2FA device, you can request a temporary passcode. This passcode is good for 3 days and 100 uses. You can request 24 passcodes per calendar year. These can be requested if you are going to a testing center and will not have access to your 2FA device.
- Knowledge Base
- Information Security & Privacy
- Knowledge Base
- Information Security & Privacy
- Knowledge Base
- Infrastructure
Clients are responsible for adhering to the following Administrative Guidelines while utilizing the Technology Solutions Data Center.
- Knowledge Base
- Information Security & Privacy
Both tags and device groups are essential for organizing and managing devices within Microsoft Defender for Endpoint, tags offer flexible labeling for filtering and policy application, whereas device groups provide structured collections for enforcing security permissions and remediation strategies.
- Knowledge Base
- Information Security & Privacy
Step-by-Step Guide to Upgrade Splunk Forwarder
- Knowledge Base
- Information Security & Privacy
This is a list of free Splunk training sources and links.
- Knowledge Base
- Information Security & Privacy
Bitlocker is a built-in encryption feature in Windows that helps protect data by encrypting entire drives. This article outlines the available methods to configure BitLocker,
- Knowledge Base
- Infrastructure
Key features and requirements of the Technology Solutions West Campus Data Center are listed below.
- Knowledge Base
- Information Security & Privacy
Your data deserves protection. The UIC license for Symantec Encryption Desktop provides easy to use and secure encryption to protect sensitive data on your laptop or desktop computers. Laptops are easily lost, and even desktop computers can be stolen. Symantec Encryption Desktop also includes a secure shredder, to really delete files you want to delete. A major motivation for using Symantec Encryption Desktop is to fulfill HIPAA requirements.
- Knowledge Base
- Infrastructure
All faculty and staff automatically have a Crashplan account created for them 24 hours after their UIC account has been created. To begin using Crashplan, simply install the client on your machine and your files should automatically begin backing up.
NOTE: Crashplan is free to use for all faculty and staff.